General

  • Target

    2024-04-22_c37dfcbd8078544a765da7e37a5d2051_cryptolocker

  • Size

    79KB

  • MD5

    c37dfcbd8078544a765da7e37a5d2051

  • SHA1

    d17686641e1a049f7fa5a0ef1b079bbd82c8faa2

  • SHA256

    3f5f250d1d13cb0f74d9776f5622ea710a3ad9bc1946a305b40185f2bd029491

  • SHA512

    3daa5b97bc05bbe0ed29eb9dda2d4f5ab8a558bd42c9211344651c1d875077c96e8fdf4a8bdf39da7b5677adb469dd923b489141a2cb8d8ce3cc702ef60814ee

  • SSDEEP

    1536:T6QFElP6n+gxmddpMOtEvwDpjwaxTNUOA+YSafiPuq8:T6a+rdOOtEvwDpjNcv

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-22_c37dfcbd8078544a765da7e37a5d2051_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections